NetApp Commandline Cheatsheet

Specifies the actual file system path corresponding to the exported file system path.

anon=<uid>|<name>

Specifies the effective user ID (or name) of all anonymous or root NFS client users that access the file system path.

nosuid

Disables setuid and setgid executables and mknod commands on the file system path.

ro | ro=clientid

Specifies which NFS clients have read-only access to the file system path.

rw | rw=clientid

Specifies which NFS clients have read-write access to the file system path.

root=clientid

Specifies which NFS clients have root access to the file system path. If you specify the root= option, you must specify at least one NFS client identifier. To exclude NFS clients from the list, prepend the NFS client identifiers with a minus sign (-).

sec=sectype

Specifies the security types that an NFS client must support to access the file system path. To apply the security types to all types of access, specify the sec= option once. To apply the security types to specific types of access (anonymous, non-super user, read-only, read-write, or root), specify the sec= option at least twice, once before each access type to which it applies (anon, nosuid, ro, rw, or root, respectively).

security types could be one of the following:

none

No security. Data ONTAP treats all of the NFS client's users as anonymous users.

sys

Standard UNIX (AUTH_SYS) authentication. Data ONTAP checks the NFS credentials of all of the
NFS client's users, applying the file access permissions specified for those users in the NFS server's /etc/passwd file. This is the default security type.

Note: Under some circumstances, if a process has an exclusive oplock on a file and a second process attempts to open the file, the first process must invalidate cached data and flush writes and locks. The client must then relinquish the oplock and access to the file. If there is a network failure during this flush, cached write data might be lost.

CIFS Commands

useful files

/etc/cifsconfig_setup.cfg

/etc/usermap.cfs

/etc/passwd

/etc/cifsconfig_share.cfg

Note: use "rdfile" to read the file

CIFS setup

cifs setup

Note: you will be prompted to answer a number of questions based on what requirements you need.

Note: To prevent users from modifying files while the FTP server is transferring them, you can enable FTP file locking. Otherwise, you can disable FTP file locking. By default, FTP file locking is disabled.

Authenication Style

options ftpd.auth_style {unix | ntlm | mixed}

bypassing of FTP traverse checking

options ftpd.bypass_traverse_checking on
options ftpd.bypass_traverse_checking off

Note: If the ftpd.bypass_traverse_checking option is set to off, when a user attempts to access a file using FTP, Data ONTAP checks the traverse (execute) permission for all directories in the path to the file. If any of the intermediate directories does not have the "X" (traverse permission), Data ONTAP denies access to the file. If the ftpd.bypass_traverse_checking option is set to on, when a user attempts to access a file, Data ONTAP does not check the traverse permission for the intermediate directories when determining whether to grant or deny access to the file.

Restricting FTP users to a specific directory

options ftpd.dir.restriction on
options ftpd.dir.restriction off

Restricting FTP users to their home directories or a default directory